Azah Anir Norman

Orcid: 0000-0001-5420-0452

According to our database1, Azah Anir Norman authored at least 26 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review.
Artif. Intell. Rev., 2023

Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges.
IEEE Access, 2023

An Empirical Examination of Formation of Trust in Blockchain.
IEEE Access, 2023

Characteristics of Blockchain and Its Relationship With Trust.
IEEE Access, 2023

Preliminary Study for Identifying Personnel for Innovative Software Engineering Project.
Proceedings of the IEEE Global Engineering Education Conference, 2023

2022
Motivating Factors to Self-Disclosure on Social Media: A Systematic Mapping.
IEEE Trans. Prof. Commun., 2022

BYOD Policy Compliance: Risks and Strategies in Organizations.
J. Comput. Inf. Syst., 2022

An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

Systematic Literature Review of Security Control Assessment Challenges.
Proceedings of the 12th IEEE International Conference on Control System, 2022

2021
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts.
J. Organ. Comput. Electron. Commer., 2021

Intention to share: the relationship between cybersecurity behaviour and sharing specific content in Facebook.
Inf. Res., 2021

Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model.
IEEE Access, 2021

Information System Audit for Mobile Device Security Assessment.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2020
The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study.
Symmetry, 2020

Compliance with bring your own device security policies in organizations: A systematic literature review.
Comput. Secur., 2020

Sarcasm identification in textual data: systematic review, research challenges and open directions.
Artif. Intell. Rev., 2020

Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping.
IEEE Access, 2020

Robots as Assistive Technology Tools to Enhance Cognitive Abilities and Foster Valuable Learning Experiences among Young Children With Autism Spectrum Disorder.
IEEE Access, 2020

2019
A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions.
IEEE Access, 2019

BYOD Security Policy Compliance Framework.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

2018
A Review of Security Awareness Approach: Ensuring Communal Learning.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2017
Information systems security practices in social software applications: A systematic literature review.
Aslib J. Inf. Manag., 2017

2016
Cyber-volunteering: Social media affordances in fulfilling NGO social missions.
Comput. Hum. Behav., 2016

Role of social media in information-seeking behaviour of international students: A systematic literature review.
Aslib J. Inf. Manag., 2016

2011
An RFID-based validation system for halal food.
Int. Arab J. Inf. Technol., 2011

2009
An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009


  Loading...